Transcription

3 Introduction Introduction The (AGO) takes a broad view of cyber crime, defining it to include both crimes facilitated by computers and those involving digital evidence. Criminals are constantly finding more inventive ways to facilitate crimes using technology. Moreover, there are inherent and increasing difficulties in investigating crimes involving digital evidence. Rapid changes in technology make cyber crime a moving target. The actions outlined in this plan are designed to equip law enforcement with the knowledge and tools necessary to fight cyber crime in the immediate future as well as over the long run. The AGO is leading a broad coalition of law enforcement entities in the development of a network to prevent and respond to cyber crime. Any law enforcement agency may become a member of the Massachusetts Cyber Crime Initiative simply by assigning an official point of contact to coordinate its activities with the Office of the Attorney General. The coalition has helped develop this Strategic Plan in order to serve as a catalyst to stimulate and guide the Commonwealth s development of cyber crime prevention and response capacity. We developed this plan recognizing that no single agency alone has the resources to counter cyber crime. Drawing upon existing centers of excellence, the Office of the Attorney General and its partners are building sustainable programs to provide Massachusetts with exceptional law enforcement and crime prevention services.

4 Background In 1994, Massachusetts became one of the first states in the nation to adopt statutes criminalizing the theft of computer services and unauthorized access to computers. Since that time, technology, particularly the Internet, has evolved at a staggering rate. The use of electronic technology is now so commonplace that almost every investigation may involve digital evidence. Unfortunately, law enforcement training, funds for cyber crime investigations, and the statutory framework for investigating and prosecuting crimes with a cyber component have not kept pace with the technology. Further, community outreach and education is only available on an ad hoc, sporadic basis, if at all. Although Massachusetts is fortunate to have some of the leading cyber crime experts in the nation and several facilities with first-rate digital evidence processing capabilities, the sheer volume of cyber crime threatens to overwhelm law enforcement and cyber crime expertise is not widely distributed across the Commonwealth. Perhaps most fundamentally, there is no unified approach to cyber crime. To address these deficiencies, Attorney General Martha Coakley brought together law enforcement and prosecutors to develop the Massachusetts Cyber Crime Initiative. The first step in developing the Massachusetts Cyber Crime Initiative was for the Attorney General s Office to conduct a survey to identify the nature and scope of cyber crime investigation and prosecution in Massachusetts. The survey also asked law enforcement officers and prosecutors what they needed to effectively respond to cyber crime. Before the Attorney General s Office conducted this survey, law enforcement had no reliable data on the nature and scope of cyber crime in Massachusetts. One hundred and fifty respondents reported that they had conducted a combined total of 13,184 investigations with a cyber component in The survey also revealed the following information: Fraud, criminal threats and forgery were the most investigated crimes involving cyber issues. Those crimes were followed by larceny, drugs, and online child solicitation and pornography. More than 900 forensic exams were reportedly conducted by Massachusetts law enforcement in Two major legal impediments faced by law enforcement are the need for administrative subpoenas and increased penalties for cyber crime. Training was cited as the single best way to increase law enforcement s ability to respond to cyber crime. Following the cyber crime survey, the Attorney General convened a meeting of key law enforcement stakeholders to develop a plan to address the cyber crime needs identified in the survey. The strategic planning participants included the Attorney General and her staff, members of the Executive Office of Public Safety, State Police, Medford Police, the Northeastern Massachusetts Law Enforcement Council, and representatives from numerous District Attorney Offices, including

5 Berkshire, Bristol, Cape and Islands, Essex, Franklin and Hampshire, Middlesex, Norfolk, Plymouth, Worcester, and Suffolk Counties. The group used the survey data and their collective experience to identify the most pressing cyber crime issues as follows: Priority 1. Deliver Law Enforcement Training Priority 2. Support and Enhance Cyber Crime Prevention and Information Sharing Activities Priority 3. Develop and Promote Common Operating Procedures and Standards Priority 4. Examine Statewide Digital Forensic Evidence Processing Requirements Priority 5. Secure Funding for Cyber Crime Programs Priority 6. Amend Jurisdictional and Substantive Law The cyber crime survey and strategic planning session allowed the Attorney General s Office to determine the nature and scope of the problem of cyber crime in Massachusetts. The following strategic plan outlines a clear mission to respond to the problem based upon the consensus of the parties. Finally, the strategic plan contains goals and objectives for gauging progress in order to deliver the highest level of public safety to the citizens of Massachusetts.

6

7 The Massachusetts Strategic Plan For Cyber Crime Mission Statement The Massachusetts Cyber Crime Initiative will develop Commonwealth-wide capacity to prevent, investigate, and prosecute cyber crime. Conditions for Success Success will require additional resources, statutory and regulatory amendments, and the adoption of common operating procedures and standards. A successful effort to combat cyber crime will only be possible through a collaborative approach between federal, state, and local criminal justice agencies. All of the priorities outlined in this plan must be addressed in order to fully realize the goals of the initiative. The steps outlined below will be accomplished by initiative partners and other experts in the field retained to provide training or other support. Priority 1: Deliver Law Enforcement Training: The 2007 Massachusetts Cyber Crime Initiative survey found that a lack of training was the number one impediment facing law enforcement when investigating crimes with a cyber component. First responders, investigators, forensics examiners, prosecutors, probation and

8 parole officials and the judiciary all require training. The first goal of the initiative is to secure the delivery of broad-based and appropriate training to law enforcement and prosecutors. Goal 1. Coordinate, develop, and deliver basic training within one year on cyber crime investigation to at least two individuals in the department of each Cyber Crime Initiative partner. a. Identify existing cyber crime training resources that meet the standards of best practices agreed upon by the partners in the initiative. b. Train law enforcement partners as cyber crime instructors to ensure sustainability and effective dissemination of information and resources. c. Develop and exploit distance learning technology to support broad delivery of training. Goal 2. Ensure delivery of cyber crime awareness at the Massachusetts police academy. a. Partner with appropriate organizations to ensure delivery of material and information at all academies, and that it is approved by those partners and integrated into the curriculum. b. Increase understanding, knowledge and proficiency of prosecutors in the area of cyber crime. c. Develop multi-tiered training addressing a broad range of digital technology, the scientific standards that form the foundation for the introduction or evidence in court, and the use and presentation of digital evidence in court. Goal 3. Increase understanding, knowledge and proficiency among the Judiciary in cyber crime. a. Develop awareness programs for delivery either in person or through distance learning or Web technology in partnership with the Judicial Training Institute and others.

9 Priority 2: Support and Enhance Cyber Crime Prevention and Information Sharing Activities The initiative will support the development of a real and a virtual community through which skills, resources, training, and best practices in investigation, prevention and community education will be shared. Goal 1. Develop a sustainable cyber crime information sharing program for Massachusetts law enforcement. a. Develop a law enforcement web site for sharing information on cyber crime in order to allow the AGO to reach the broadest possible audience 24 hours a day b. Deliver four information sharing meetings for Massachusetts law enforcement. c. Develop a quarterly electronic publication on cyber crime for law enforcement d. Designate a working group to coordinate digital evidence information sharing activities across Massachusetts. Goal 2. Develop a network of resources and trainers to provide community-based programming in the area of Internet safety. a. Conduct a literature review to gather best practices in prevention education. b. Assess current literature and practices. c. Conduct a gap analysis to assess the need for material development. d. Develop materials for use by community-based trainers and through Web-based technology. e. Identify law enforcement and other community based stakeholders who are committed to the principles of prevention and education. Priority 3: Develop and Promote Common Operating Procedures and Standards: Operating procedures and standards are essential to protect the integrity and reliability of digital evidence. Only a cooperative effort working through consensus to develop and adopt common operating procedures and best practices will succeed.

10 Goal 1. Assemble a working group to review existing evidence collection and forensic operating protocols. a. Through consensus, develop best practices in the investigation and prosecution of cyber crime. b. Promote the broad adoption of the best practices. Priority 4: Examine Statewide Digital Forensic Evidence Processing Requirements The number of investigations requiring digital evidence examinations will dramatically increase. In order to maintain the significant ground gained during this period of collaboration, the partners in the initiative must put in place systems for ongoing assessment and planning. Goal 1. Continue to analyze the nature and prevalence of cyber crime through surveys and data gathering. a. Continue to gather data on the nature and scope of cyber crime. b. Continue to evaluate existing resources. c. Evaluate whether existing resources are sufficient to address the problem and, if not, what alternatives are available. Priority 5: Secure Funding for Cyber Crime Programs The costs associated with combating cyber crime are recurring, ongoing, and increasing. Given the ongoing and increasing expenses involved in combating cyber crime, financial resources must be identified. Goal 1. Identify sources of funding for cyber crime programs. a. Identify and apply for federal funds that may be accessed or leveraged by the Cyber Crime Initiative. b. Identify and apply for funds in the Commonwealth that may be accessed or leveraged by the Cyber Crime Initiative.

11 c. Identify local resources that may be accessed or leveraged by the Cyber Crime Initiative. d. Identify private sector / not-for-profit resources that may be accessed or leveraged by the Cyber Crime Initiative. Priority 6: Amend Jurisdictional and Substantive Law We are fighting 21st Century crime with 19th Century laws. Legislative support is necessary to effectively combat cyber crime. Goal 1. The Office of the Attorney General, the Massachusetts District Attorneys Association, Cyber Crime Initiative law enforcement partners, and the Commonwealth s legislators will prioritize the list of potential changes to the jurisdictional and substantive law and develop a plan to introduce legislation to amend these laws.

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME MAY 2004 Page 1 of 7 State of New Hampshire Strategic Plan to Address Cyber Crime May 2004 Introduction Cyber crime, or more broadly, electronic

Resources If you are a crime victim, you have certain rights under Massachusetts Law, and you are eligible for certain services. For further information about victim rights and victim services, contact

CITY OF TAMPA Bob Buckhorn, Mayor POLICE DEPARTMENT Jane Castor Chief of Police United States Senate Special Committee on Aging Mr. Chairman Members of the Committee On behalf of the City of Tampa, Mayor

State of the States Cyber Crime Consortium By Justin Fitzsimmons Program Manager, High-Tech Crime Training Services SEARCH On April 30, 2015, the Office of the Massachusetts Attorney General, along with

Marijuana in Massachusetts Arrests, Usage, and Related Data Jon Gettman, Ph.D. The Bulletin of Cannabis Reform www.drugscience.org 10/19/2009 1 Introduction This state report is part of a comprehensive

THE IDENTIFICATION OF INDIVIDUALS POTENTIALLY AFFECTED BY THE ALLEGED CONDUCT OF CHEMIST ANNIE DOOKHAN AT THE HINTON DRUG LABORATORY FINAL REPORT TO GOVERNOR DEVAL PATRICK David E. Meier Special Counsel

SAA Strategic Planning: Stakeholder Engagement Strategies OUTREACH SAAs have enhanced their outreach to non-traditional partners: public defense, state health and human service agencies, state and local

An Overview of Cybersecurity and Cybercrime in Taiwan I. Introduction To strengthen Taiwan's capability to deal with information and communication security issues, the National Information and Communication

Budget Amendment ID: FY2014-S3-90 Collection of Data on Juvenile Justice Ms. Creem and Mr. Tarr moved that the bill be amended by inserting, after section, the following new section:- JUD 90 SECTION. (a)

Colorado Integrated Criminal Justice Information System (CICJIS) Program CHARTER and BYLAWS Program Description The Colorado Integrated Criminal Justice Information System (CICJIS) Program is a complex

HOUSE DOCKET, NO. 3965 FILED ON: 11/18/2013 HOUSE............... No. 3825 The Commonwealth of Massachusetts PRESENTED BY: Randy Hunt To the Honorable Senate and House of Representatives of the Commonwealth

APPENDIX: OVERVIEW OF PUBLIC INTEREST WORK Public interest work is done in a wide variety of practice settings. Lawyers also use different advocacy approaches. Finally, different organizations focus on

Peace and Justice in Cyberspace Potential new international legal mechanisms against global cyberattacks and other global cybercrime An International Criminal Tribunal for Cyberspace International cybercrime

Part II FEDERAL CHALLENGES AND CHOICES POLICY BACKGROUND Under the American federal system most law is cast as state statutes and local ordinances; accordingly, most law enforcement is the responsibility

U.S. Department of Justice FY 2016 Budget Request NATIONAL SECURITY +$106.8 Million in Program Increases FY 2016 Overview Defending U.S. citizens from both internal and external threats remains the Department

COLORADO REVISED STATUTES *** This document reflects changes current through all laws passed at the First Regular Session of the Sixty-Ninth General Assembly of the State of Colorado (2013) *** TITLE 25.

Department of Communications Enhancing Online Safety for Children Discussion Paper Submission by the Australian Federal Police March 2014 1 Introduction The AFP welcomes the opportunity to make a submission

COMPUTER CRIME IN NORTH CAROLINA: Assessing the Needs of Local Law Enforcement North Carolina Governor s Crime Commission/ Criminal Justice Analysis Center Written by Justin T. Davis, Research Associate

Stearns County, MN Repeat Felony Domestic Violence Court Planning and Implementation Best Practice Guide How can a community come together to change its response to domestic violence crimes? Can a court

The following states were recommended and awarded grants: ARIZONA Arizona Criminal Justice Commission Amount: $230,000 The Arizona Criminal Justice Commission will use the funds for three projects: Juvenile

Introduction to Law and Public Safety 1 Career Cluster Law, Public Safety, Security & Corrections Course Code 15001 Prerequisite(s) None Credit 1.0 Program of Study and Foundation courses, Law and Public

Senate Bill No. 38 Committee on Transportation and Homeland Security CHAPTER... AN ACT relating to criminal records; creating the Records and Technology Division of the Department of Public Safety; enumerating

Printed: //003 4:54 PM Program C: Criminal Law and Medicaid Fraud Unless otherwise indicated, all objectives are to be accomplished during or by the end of FY 003-004. Objectives may be key or supporting

1 CTC Special Meeting on Communications and IT New York May 2013 Ms Marta Requena Chief, Terrorism Prevention Branch United Nations Office on Drugs and Crime Excellencies, Distinguished Delegates, Ladies

TEXAS HOMELAND SECURITY STRATEGIC PLAN 2015-2020: PRIORITY ACTIONS INTRODUCTION The purpose of this document is to list the aligned with each in the Texas Homeland Security Strategic Plan 2015-2020 (THSSP).

The Texas District and County Attorneys Association August, 2010 The Texas District and County Attorneys Association (TDCAA) is a professional 501(c)(6) nonprofit corporation dedicated to providing educational

January 2007 An Overview of U.S. Security Breach Statutes An Overview of U.S. Security Breach Statutes Jeffrey M. Rawitz and Ryan E. Brown 1 This Jones Day White Paper summarizes what is generally entailed

Council of the European Union Brussels, 13 June 2016 (OR. en) 10128/16 OUTCOME OF PROCEEDINGS From: On: 9 June 2016 To: General Secretariat of the Council Delegations No. prev. doc.: 8770/16, 8819/16 Subject:

MAURA HEALEY ATTORNEY GENERAL THE COMMONWEALTH OF MASSACHUSETTS OFFICE OF THE ATTORNEY GENERAL ONE ASHBURTON PLACE BOSTON, MASSACHUSETTS 02108 TEL: (617) 727-2200 www. mass. go v/ago June 8, 2015 The Honorable

Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their

Department of Justice Policy Guidance 1 Domestic Use of Unmanned Aircraft Systems (UAS) INTRODUCTION The law enforcement agencies of the Department of Justice ("the Department") work diligently to protect

WHAT IS THE ILLINOIS CENTER OF EXCELLENCE AND HOW DID IT START? MISSION STATEMENT The mission of the Illinois Center of Excellence for Behavioral Health and Justice is to equip communities to appropriately

MINNESOTA S EXPERIENCE IN REVISING ITS JUVENILE CODE AND PROSECUTOR INPUT IN THE PROCESS September 1997 In 1991, Minnesota began a major effort to substantially revise the laws governing our juvenile justice

Executive Report to the CACP Board of Directors from CACP Global 2015 Cyber crime: Police Roles and Responsibilities Within a Collaborative Framework In the fall of 2014, the CACP Board of Directors assigned

Attachment 1 Program Narrative - Attachment 2 Community Law Enforcement and Recovery (CLEAR) Program The Community Law Enforcement and Recovery (CLEAR) Program began in 1997 as an innovative City of Los

Don t just stand there... Drawing by Ruth Meyers Laider Revised Edition, January 2008 A Candidate s Guide to the 2008 State Election Published by William Francis Galvin Secretary of the Commonwealth Elections

COMPUTER- LINKED TRANSACTIONAL RECORDS FOR CRIMINAL JUSTICE STATISTICS Steve E. Kolodney and Paul K. Wormeli Public Systems incorporated For years, national and state authorities, commissions and hearings

Strengthening the Criminal Justice in Pennsylvania Prepared by the PCCD, Office of Victims Services Summary Restitution holds offenders accountable for the financial losses suffered by the victims of their

COMMITTEE OF EXPERTS ON TERRORISM (CODEXTER) CYBERTERRORISM THE USE OF THE INTERNET FOR TERRORIST PURPOSES UNITED STATES OF AMERICA September 2007 Kapitel 1 www.coe.int/gmt The responses provided below

2013 was a Legislative Overview 2 Highlights from the 2013 legislative session, including major reforms in drug sentencing and pretrial justice CCJJ Bills 4 List of CCJJ recommendations passed into law

Computer Forensics Preparation This lesson covers Chapters 1 and 2 in Computer Forensics JumpStart, Second Edition. OBJECTIVES When you complete this lesson, you ll be able to Discuss computer forensics

Council of Europe Project on Cybercrime in Georgia Report by Virgil Spiridon and Nigel Jones Tbilisi 28-29, September 2009 Presentation Contents An assessment of the Georgian view of cybercrime and current

Appendix F MANDATORY MINIMUM REPORT FIELD INTERVIEW PROTOCOL FOR U.S. ATTORNEY REPRESENTATIVE Introductory Statement Hello, we are from the U.S. Sentencing Commission and are visiting your office today

COE Convention nr 185 on cybercrime Concluded in Budapest on 23 November 2001 First comprehensive instrument underlining the seriousness of cybercrime and the possible remedies Defines a series of offences

REPORT OF FLORIDA PROSECUTING ATTORNEYS ASSOCIATION Re: The Office of Statewide Prosecution DECEMBER 2001 I. BACKGROUND The Office of Statewide Prosecution (OSWP) was created by Constitutional Amendment

Office of Essex County District Attorney Jonathan W. Blodgett CHILD ABUSE & NEGLECT What you need to know about reporting child abuse and neglect. October 2005 Page 2 Essex County District Attorney s Office

THE DEPARTMENT OF SOCIAL AND BEHAVIORAL SCIENCES CRIMINAL JUSTICE PROGRAM HANDBOOK MAY 2015 Criminal Justice The Criminal Justice Program offers a course of study to prepare the pre-service student for

Appendix A Financial Crimes Enforcement Network Programs The Department of the Treasury established the Financial Crimes Enforcement Network in April 1990. 33 FinCEN s original mission was to establish

INVESTIGATING AND PROSECUTING MONEY LAUNDERING This one-day course will discuss the criminal elements and case law for N.J.S.A criminal statue 2C:21-25, Financial Facilitation of Criminal Activity, also

ELEMENTS OF FINANCIAL CRIMES INVESTIGATIONS This one-day course will provide an officer with the essential investigative foundation to conduct a financial crimes investigation in today s technology driven

ELEMENTS OF FINANCIAL CRIMES INVESTIGATIONS This one-day course will provide an officer with the essential investigative foundation to conduct a financial crimes investigation in today s technology driven

To ensure the functioning of the site, we use cookies. We share information about your activities on the site with our partners and Google partners: social networks and companies engaged in advertising and web analytics. For more information, see the Privacy Policy and Google Privacy &amp Terms.
Your consent to our cookies if you continue to use this website.